-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3219-1 security@debian.org http://www.debian.org/security/ Alessandro Ghedini April 11, 2015 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : libdbd-firebird-perl CVE ID : CVE-2015-2788 Debian Bug : 780925 Stefan Roas discovered a way to cause a buffer overflow in DBD-FireBird, a Perl DBI driver for the Firebird RDBMS, in certain error conditions, due to the use of the sprintf() function to write to a fixed-size memory buffer. For the stable distribution (wheezy), this problem has been fixed in version 0.91-2+deb7u1. For the upcoming stable distribution (jessie), this problem has been fixed in version 1.18-2. For the unstable distribution (sid), this problem has been fixed in version 1.18-2. We recommend that you upgrade your libdbd-firebird-perl packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVKPJTAAoJEK+lG9bN5XPLrfkP/2BLZPy1lljAkuYT69CUFEpA LqvaAHU8PSkMhOgKInzfwlHgCGND6a613NRdhSGA6ctmh69qHdW7tJhwwk0vatpS dE2a7K9tFRxHpUaS96x7annDz0M7hDzmHtAwx4LckPO9WSJJtgCf7/N2BwhM24Hz 1L0Q2IxhXDVBQOBU1pUOB7KYY4HoqVvmzQO/MML2wnxqn2SRynKsbMr3Y8jA5mUm Ob+CjRVty7k7Lc7O3qTD8MH5oF67sn2485QDz/pUzkwF4PUd5GU72NXBtjfBiLq4 BsgB/IFDJJOSeW7+J7GzBs2XnI2jQ3d7pCbvVMWGV0B8y3HL0Q+SmNxgRRwdrFyN 6jIDpr85N+mnN7RCb0ezedm1sUbNDelAmV8hr37/+1oKU/3cIeMfCqJIO7jQdrls 8V5IEEY5PekoGzJk6LcvGyTTI+hPzKIKt8i6GKOPDhRnHiCxguviQkFa01AjWi7j PR6uqEca1eGbp6yLtKKglgjci9M9G+JLHCAJh/9q7aptKOTwy+/vZwCFGOkVOWIK 2DStOKtolcfxXiF2Re9VjcjqRDrrfG38ElKwgdM13fx6IIl0olg9iI3De7dfzmDl AMjVt3/OjsmjXP1ybxsfItE9PqDMcfbOF7csHlnr06zHBqTi2Psa4fsqgdTlu6b4 D5NSQJbxU0l3va9YJuWD =XtIL -----END PGP SIGNATURE-----